http://mhkmuseum.edmun-mhk.go.th/bordo.htm
http://mhkmuseum.edmun-mhk.go.th/bordo.htm defaced by 1923Turk
http://www.mahasarakham.go.th/mkpoll
http://www.mahasarakham.go.th/mkpoll defaced by Ashiyane Digital Security Team
http://www.lampang.go.th/webb/ash.html
http://www.lampang.go.th/webb/ash.html defaced by Ashiyane Digital Security Team
Nothing’s anonymous in a WikiLeak world – Technology Spectator
Nothing's anonymous in a WikiLeak world Technology Spectator The two most prominent examples, of course, are the cases of the collective Anonymous releasing more than 10 gigabytes of data from local sheriffs' departments last week and WikiLeaks , specifically Julian Assange's publication of more than 250000 US ...
Zero Day Initiative Advisory 11-259
Zero Day Initiative Advisory 11-259 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way QuickTime handles corrupt Sample Size atoms
Zero Day Initiative Advisory 11-258
Zero Day Initiative Advisory 11-258 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime.
Zero Day Initiative Advisory 11-257
Zero Day Initiative Advisory 11-257 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a frame within an H.264 encoded movie
http://www.ska1.go.th/pr/view.php?article_id=25
http://www.ska1.go.th/pr/view.php?article_id=25 defaced by Ashiyane Digital Security Team
Zero Day Initiative Advisory 11-256
Zero Day Initiative Advisory 11-256 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.